CompTIA Cloud+: Cloud Security Controls

CompTIA Cloud+    |    Intermediate
  • 16 videos | 1h 42m 38s
  • Earns a Badge
Rating 4.5 of 2 users Rating 4.5 of 2 users (2)
There are certain security controls that all network administrators must know in order to protect their valuable systems and data. In this course, explore cloud security controls, beginning with endpoint protection, data loss prevention (DLP), intrusion prevention and detection systems (IPS/IDS), and distributed denial-of-service (DDoS) protection. Next, examine cloud firewalls, web application firewalls (WAFs), network security groups, network segmentation, and network protocols. Finally, learn about network services, flow analysis and event monitoring, identity and access management (IAM) policies, and how to create subnets in a cloud virtual network. This course is one of a collection that prepares learners for the CV0-004: CompTIA Cloud+ certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline endpoint protection and its relevance in cloud computing
    Recognize the role of data loss prevention (dlp) and how it's utilized in cloud computing
    Describe intrusion prevention and detection systems (ips/ids) and why they must be implemented in cloud systems
    Outline distributed denial-of-service (ddos) and why protecting against ddos is a necessary component of cloud computing
    Identify the key characteristics of cloud firewalls and the various firewall options available
    Recognize the purposes of web application firewalls (wafs) in cloud computing environments
    Create network security groups (nsgs), an important component in cloud computing protection
  • Outline how to secure a network in a cloud environment using network segmentation
    Identify how to use network protocols to secure a network in a cloud environment
    Recognize how to secure a network in a cloud environment using network services
    Describe how to monitor the security of a network environment using log and event monitoring
    Implement identity and access management (iam) policies in a cloud environment
    Outline how subnets are used to create additional layers of protection in cloud computing environments
    Create a virtual network in the cloud and segment it by adding subnets
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 4s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 6m 48s
    Upon completion of this video, you will be able to outline endpoint protection and its relevance in cloud computing. FREE ACCESS
  • Locked
    3.  Data Loss Prevention (DLP)
    7m 12s
    Through this video, you will be able to recognize the role of data loss prevention (DLP) and how it's utilized in cloud computing. FREE ACCESS
  • Locked
    4.  Intrusion Prevention and Detection Systems (IPS/IDS)
    7m 8s
    After completing this video, you will be able to describe intrusion prevention and detection systems (IPS/IDS) and why they must be implemented in cloud systems. FREE ACCESS
  • Locked
    5.  Distributed Denial-of-Service (DDoS) Protection
    5m 36s
    In this video, we will outline distributed denial-of-service (DDoS) and why protecting against DDoS is a necessary component of cloud computing. FREE ACCESS
  • Locked
    6.  Cloud Firewalls
    6m 45s
    Upon completion of this video, you will be able to identify the key characteristics of cloud firewalls and the various firewall options available. FREE ACCESS
  • Locked
    7.  Web Application Firewalls (WAFs)
    7m 39s
    Through this video, you will be able to recognize the purposes of web application firewalls (WAFs) in cloud computing environments. FREE ACCESS
  • Locked
    8.  Creating Network Security Groups (NSGs)
    5m 56s
    Discover how to create network security groups (NSGs), an important component in cloud computing protection. FREE ACCESS
  • Locked
    9.  Network Segmentation
    7m 37s
    After completing this video, you will be able to outline how to secure a network in a cloud environment using network segmentation. FREE ACCESS
  • Locked
    10.  Network Protocols
    6m 58s
    In this video, we will identify how to use network protocols to secure a network in a cloud environment. FREE ACCESS
  • Locked
    11.  Network Services
    5m 59s
    Through this video, you will be able to recognize how to secure a network in a cloud environment using network services. FREE ACCESS
  • Locked
    12.  Network Flow Analysis and Event Monitoring
    5m 23s
    Upon completion of this video, you will be able to describe how to monitor the security of a network environment using log and event monitoring. FREE ACCESS
  • Locked
    13.  Implementing Identity and Access Management (IAM) Policies
    12m 34s
    Learn how to implement identity and access management (IAM) policies in a cloud environment. FREE ACCESS
  • Locked
    14.  Subnets
    8m 26s
    After completing this video, you will be able to outline how subnets are used to create additional layers of protection in cloud computing environments. FREE ACCESS
  • Locked
    15.  Creating Subnets in a Cloud Virtual Network
    6m 41s
    During this video, discover how to create a virtual network in the cloud and segment it by adding subnets. FREE ACCESS
  • Locked
    16.  Course Summary
    54s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.